9.8
CVE-2024-21413
- EPSS 93.52%
- Veröffentlicht 13.02.2024 18:16:00
- Zuletzt bearbeitet 28.10.2025 14:36:10
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Microsoft Outlook Remote Code Execution Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Office 2016 Version- SwEdition- HwPlatformx64
Microsoft ≫ Office 2016 Version- SwEdition- HwPlatformx86
Microsoft ≫ Office 2019 Version- HwPlatformx64
Microsoft ≫ Office 2019 Version- HwPlatformx86
Microsoft ≫ Office Long Term Servicing Channel Version2021
06.02.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Outlook Improper Input Validation Vulnerability
SchwachstelleMicrosoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.
BeschreibungApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 93.52% | 0.998 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.